ldionmarcil / sudo-backdoor
Wraps sudo; transparently steals user's credentials. For those annoying times when you get a shell/file write on a sudoers account and need to leverage their credentials.
☆35Updated this week
Related projects ⓘ
Alternatives and complementary repositories for sudo-backdoor
- Cronbased Dirty Cow Exploit☆31Updated 7 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 8 years ago
- Axis2 RPC Shell☆15Updated 9 years ago
- A tool to analyse JMX API security level.☆43Updated 10 years ago
- public exploits☆35Updated last year
- Stækka Metasploit - Extenting Metasploit☆53Updated 7 years ago
- Nashorn Post Exploitation☆31Updated 6 years ago
- Burp plugin to do random fuzzing of HTTP requests☆33Updated 7 years ago
- ☆20Updated 10 months ago
- Simple socket-based gateway to the Burp Collaborator☆33Updated 7 years ago
- PoC for Scala and Groovy☆14Updated 8 years ago
- Python script which will type a file into an RDP session. For when drag and drop and disk mounting is not possible☆31Updated 6 months ago
- Automate SSH communication with firewalls, switches, etc.☆26Updated 6 years ago
- Payload generator for Java Binary Deserialization attack with Commons FileUpload (CVE-2013-2186)☆39Updated 8 years ago
- Yet Another SMB PSEXEC (Y.A.S.P) Tool☆21Updated 11 years ago
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆45Updated 6 years ago
- A quick and dirty .NET "Deserialize_*" fuzzer based on James Forshaw's (@tiraniddo) DotNetToJScript.☆42Updated 6 years ago
- A set of compiled application restriction bypasses☆29Updated 7 years ago
- CVE-2017-10271 WEBLOGIC RCE (TESTED)☆37Updated 6 years ago
- Unified repository for different Metasploit Framework payloads☆47Updated 4 years ago
- A relatively flexible tool to parse mimikatz output☆35Updated 8 years ago
- Offline Security Focus Database☆31Updated 11 years ago
- A brute force program to test weak accounts configured to access a JMX Registry☆33Updated 7 years ago
- Socks5 server over Websockets☆40Updated 6 years ago
- Data exfiltration using reflective DNS resolution covert channel☆51Updated 6 years ago